Sciweavers

1298 search results - page 128 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
140
Voted
ISSS
1996
IEEE
123views Hardware» more  ISSS 1996»
15 years 7 months ago
Memory Organization for Improved Data Cache Performance in Embedded Processors
Code generation for embedded processors creates opportunities for several performance optimizations not applicable for traditional compilers. We present techniques for improving d...
Preeti Ranjan Panda, Nikil D. Dutt, Alexandru Nico...
151
Voted
AIRWEB
2007
Springer
15 years 9 months ago
Extracting Link Spam using Biased Random Walks from Spam Seed Sets
Link spam deliberately manipulates hyperlinks between web pages in order to unduly boost the search engine ranking of one or more target pages. Link based ranking algorithms such ...
Baoning Wu, Kumar Chellapilla
245
Voted
ICDE
2006
IEEE
146views Database» more  ICDE 2006»
16 years 4 months ago
Using XML to Build Efficient Transaction-Time Temporal Database Systems on Relational Databases
In this paper, we present the ArchIS system that achieves full-functionality transaction-time databases without requiring temporal extensions in XML or database standards. ArchIS&...
Fusheng Wang, Xin Zhou, Carlo Zaniolo
153
Voted
ICEIS
2008
IEEE
15 years 10 months ago
Internal Fraud Risk Reduction - Results of a Data Mining Case Study
Corporate fraud these days represents a huge cost to our economy. Academic literature already concentrated on how data mining techniques can be of value in the fight against frau...
Mieke Jans, Nadine Lybaert, Koen Vanhoof
123
Voted
AINA
2006
IEEE
15 years 9 months ago
Clustering Protocol for Sensor Networks
In this paper we present Clustering Protocol (CP) for sensor networks. Clustering techniques are used by different protocols and applications to increase scalability and reduce de...
Arjan Durresi, Vamsi Paruchuri, Leonard Barolli